Computer Forensics: an approach to evidence in cyberspace

Size: px
Start display at page:

Download "Computer Forensics: an approach to evidence in cyberspace"

Transcription

1 Computer Forensics: an approach to evidence in cyberspace Abstract This paper defines the term computer forensics, discusses how digital media relates to the legal requirements for admissibility of paper-based evidence and suggests a methodology for dealing with potential evidence. The conclusion is that digitally based evidence must be both scientifically sound and legally acceptable. Keywords: law, law enforcement, evidence, forensics, criminal, testimony, court Introduction A government official is caught embezzling hundreds of thousands of dollars from his agency. A Federal Search Warrant is executed at his residence for evidence of his crime and to locate the money. The money is not found, but on his computer is a letter discussing the disposition of the illegally obtained funds. A pedophile is caught attempting to molest children. His residence is searched for evidence which will prove that this incident is part of a long-standing pattern of behavior and which will identify additional victims. On his computer numerous images are stored which depict the subject, his residence and several neighborhood children committing sex acts. A terrorist bombing suspect s home is searched for evidence of the conspiracy and the motive for the crime. Fragments of documents and drawings are found on the computer of the suspect which link him to the bombing and provide insight as to the motive for the crime. A con man is tried in Federal Court for running a scam in which the prizes will never be given away. A computer forensic specialist testifies that the computer program which is used to determine the winning numbers is programmed in such a way that the prizes are outside the range of the program s variables. In each of these cases the critical evidence was developed from the perpetrator s own computer and subsequently used in legal proceedings. Law enforcement and the legal establishment are facing a new challenge. Criminal acts are being committed and the evidence of these activities are recorded in electronic form. Additionally, crimes are being committed in cyberspace. Evidence in these crimes is almost always recorded in digital fashion. It is important that computer security professionals be aware of some of the requirements of the legal system and understand the developing field of computer forensics. Hundreds of years of tradition and countless court decisions have developed the complex set of rules that apply to evidence which can be used in legal proceedings. The reality of the Information Age is having a significant impact on the legal establishment. One major area in which this is being felt is that of the acquisition, authentication, evaluation, and legal admissibility of information stored on magnetic and other media.

2 This information can be referred to as digital evidence. Computer forensics is the application of science and engineering to the legal problem of digital evidence. It is a synthesis of science and law. At one extreme is the pure science of ones and zeros. At this level, the laws of physics and mathematics rule. At the other extreme, is the courtroom. To get something admitted into court requires two things. First, the information must be factual. Secondly, it must be introduced by a witness who can explain the facts and answer questions. While the first may be pure science, the latter requires training, experience, and an ability to communicate the science. The Document Paradigm In the paper-based world, the law assumes a process which is mutually understood and observed by all the parties. Almost without thinking, a four-part process takes place. When we try to apply this process to digital evidence, we see that we have a new set of problems. First, a document is acquired. How it is acquired (via consent, search warrant, a public record, business record) is subject to a set of rules that have a long and welldocumented history. Even so, there are often cases where there will be room for disagreement which will then result in litigation. Rarely is determining that the document physically exists or where it came from, a problem. With digital evidence, this is often a problem. What does this binary string represent? Where did it come from? While these questions, to the computer literate, may seem obvious at first glance, they are neither obvious nor understandable to the layman. These problems then require a substantial foundation being laid prior to their admission into evidence at trial. Next, a document will undergo an identification process. If the document is in English, then anyone who can read English can probably determine what the document says. It s format and content define its purpose. A binary file requires conversion, in the form of a program, which will transform the data into a form which is humanly readable. Only then, can a human determine what the document is. Evaluation of the document follows. This is the time when the reader determines if the information contained in the document is relevant and determines who could testify concerning this document. When our digital data is in human readable form, we can also make these determinations. However, the electronic context of a file is arguably still significant. This will impact on how the evidence is introduced and by whom. Ultimately, the document may be offered for evidence. This must be done by a warm, breathing, human being who has legal standing to explain it s origin, it s meaning, or both. In the case of paper evidence, the judge and jury may physically inspect the paper and will hear someone who is personally aware of the document describe it and it s significance. It is not necessary to explain the three prior steps to the court, as these

3 are generally accepted by all participants. At this stage of legal history, such is not the case for digital evidence. As a result, it is often necessary to have the testimony of someone who can explain the process of acquisition, identification, and evaluation. This process can be summarized as follows: Acquisition Identification evaluation Admission as evidence The Digital Paradigm In the case of paper evidence, this process is very clear and is intuitively obvious. Digital evidence, by it s very nature is invisible to the eye. Therefore the evidence must be developed using tools other than the human eye. It is only logical that the process used in the case of digital evidence mimic the process that is used for paper evidence. Because each step requires the use of tools or knowledge, the process must be documented, reliable and repeatable. The process itself must be understandable to the members of the court. Acquisition of evidence is both a legal and technical problem. In fact, these two aspects are irrevocably related. The law specifies what can be seized, under what conditions, from whom, and from where it may be seized. The determination of what a particular piece of digital evidence is, requires its examination. Is a particular file a word processing document or an executable program? It may require examination to determine where a particular piece of evidence is physically located. Is the file on a local hard drive or is it on a server located in another legal jurisdiction? In short, it may be necessary to show a technical basis for obtaining the legal authority to search. Likewise, it may require technical skills in order to actually accomplish the search. The product of this phase is usually raw media, devoid of meaning or usefulness. Actually identifying a piece of digital evidence represents a three-step process. It must be definable in its physical form. That is, that it resides on a specific piece of media. Next, it must be identifiable as to its logical position. Where does it reside relative to the file system? Lastly, we must place the evidence in the correct context in order to read it s meaning. This may require looking at the evidence as machine language, for example, ASCII or EBCDIC, or by means of an application (program).

4 Each of these steps requires technical skills and may subsequently require testimony at trial. At this point, we have translated the media into data. Evaluation of the data involves both technical and legal judgements. Data that is placed in its proper context is called information. From a technical standpoint, it may be possible to make conclusions as to: how the data was produced, when and by whom. The legal issues are the relevance of the information, its reliability, and who can testify to it. The path that digital evidence takes can be depicted as follows: Physical Logical Legal Context Context Context Media Data Information Evidence Conclusion In law, if information is not admitted into evidence, then, for legal purposes, it does not exist. Testimony by both the forensic specialist who developed the evidence and someone who can explain it s significance to the case is often required. Only then does the information become evidence. It should be clear from the above that technical skills and legal expertise must be combined in order to discover, develop and utilize digital evidence. The process used must conform to both the law and science. Failure in either arena, renders the product legally worthless. The preceding has been based on the use of computer forensics to exploit stored digital information. Certainly, this need will grow dramatically in the future, as more and more of society's information are stored electronically. However, a potentially even larger use may be to document activities and processes that take place electronically. In other words, to examine data that is not only at rest, but also that which is in motion. And while the law will slowly evolve and accept more and more technical issues, computer forensic specialists will continue the process of education for all parties in the legal process.

5 References: Catherine H. Conly Organizing for Computer Crime Investigation and Prosecution (Washington, DC: National Institute of Justice, 1989). Donn B. Parker Computer Crime: Criminal Justice Resource Manual (Washington, DC: National Institute of Justice, 1989). United States Department of Justice Guidelines for Searching and Seizing Computers (Washington, DC.: U.S. Government Printing Office, 1994) United States Department of Justice Basic Considerations in Investigating and Proving Computer-Related Federal Crimes (Washington, DC.: U.S. Government Printing Office, 1988)

Legal view of digital evidence

Legal view of digital evidence Chapter 2 Legal view of digital evidence Before developing a model or a theory, it is important to understand the requirements of the domain in which the model or the theory is going to be used. The ultimate

More information

Criminal Justice Sector and Rule of Law Working Group

Criminal Justice Sector and Rule of Law Working Group Criminal Justice Sector and Rule of Law Working Group Recommendations for Using and Protecting Intelligence Information In Rule of Law-Based, Criminal Justice Sector-Led Investigations and Prosecutions

More information

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now

Decades of Successful Sex Crimes Defense Contact the Innocence Legal Team Now Criminal Court Felonies The U.S. has the highest rate of felony conviction and imprisonment of any industrialized nation. A felony crime is more serious than a misdemeanor, but the same offense can be

More information

JUVENILE JUSTICE SYSTEM

JUVENILE JUSTICE SYSTEM JUVENILE JUSTICE SYSTEM A delinquency petition is a court document alleging that a juvenile, between ages 10-16, has violated a law which would be a criminal offense if committed by an adult. Disposition

More information

AN INTRODUCTION COURT. Victim Services Department of Justice

AN INTRODUCTION COURT. Victim Services Department of Justice AN INTRODUCTION TO COURT Victim Services Department of Justice TABE OF CONTENTS 1. INTRODUCTION......1 2. FIING A POICE REPORT...1 3. COURT PROCESS......2 4. TESTIFYING IN COURT...5 5. COMMONY ASKED QUESTIONS...6

More information

Information for Crime Victims and Witnesses

Information for Crime Victims and Witnesses Office of the Attorney General Information for Crime Victims and Witnesses MARCH 2009 LAWRENCE WASDEN Attorney General Criminal Law Division Special Prosecutions Unit Telephone: (208) 332-3096 Fax: (208)

More information

A Citizen s Guide to the Criminal Justice System: From Arraignment to Appeal

A Citizen s Guide to the Criminal Justice System: From Arraignment to Appeal A Citizen s Guide to the Criminal Justice System: From Arraignment to Appeal Presented by the Office of the Richmond County District Attorney Acting District Attorney Daniel L. Master, Jr. 130 Stuyvesant

More information

Confusion on the Front Lines: The Response of Law Enforcement and Prosecutors to Cases of Elder Abuse

Confusion on the Front Lines: The Response of Law Enforcement and Prosecutors to Cases of Elder Abuse Confusion on the Front Lines: The Response of Law Enforcement and Prosecutors to Cases of Elder Abuse Page Ulrey, J.D. King County Prosecutor s Office Seattle, Washington I. Introduction Having historically

More information

Name: State Bar number: Telephone: Fax: Full time SF office address: Mailing address (if different):

Name: State Bar number: Telephone: Fax: Full time SF office address: Mailing address (if different): Lawyer Referral and Information Service 301 Battery Street, Third Floor San Francisco, CA 94111 Telephone: (415) 477-2374 Fax: (415) 477-2389 URL: www.sfbar.org APPLICATION FOR JUVENILE DELINQUENCY LAW

More information

Evidence Blocking* Jonathan Rapping** ** Jonathan Rapping is the Executive Director of the Southern Public

Evidence Blocking* Jonathan Rapping** ** Jonathan Rapping is the Executive Director of the Southern Public Evidence Blocking* Jonathan Rapping** * The term evidence blocking and the ideas set forth in this paper come from my colleague and mentor at the D.C. Public Defender Service, Jonathan Stern. Mr. Stern

More information

Chapter 3. Justice Process at the County Level. Brooks County Courthouse

Chapter 3. Justice Process at the County Level. Brooks County Courthouse Chapter 3 Justice Process at the County Level Brooks County Courthouse Chapter Three: Judice Process at the County Level Developmental Assets: Life Skills: TEKS: Objectives: 10. Safety 30. Responsibility

More information

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.

Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado. Boulder Municipal Court Boulder County Justice Center P.O. Box 8015 1777 6 th Street Boulder, CO 80306-8015 www.bouldercolorado.gov/court JURY READINESS CONFERENCE INSTRUCTIONS You have set your case for

More information

KEY LEGAL ISSUE #4. EXPERT WITNESS and SCIENTIFIC EVIDENCE in ENVIRONMENTAL CASES

KEY LEGAL ISSUE #4. EXPERT WITNESS and SCIENTIFIC EVIDENCE in ENVIRONMENTAL CASES KEY LEGAL ISSUE #4 EXPERT WITNESS and SCIENTIFIC EVIDENCE in ENVIRONMENTAL CASES Under Philippine rules, it is sufficient that the expertise of the witness is supported by the following factors: Education

More information

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/

Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Stages in a Capital Case from http://deathpenaltyinfo.msu.edu/ Note that not every case goes through all of the steps outlined here. Some states have different procedures. I. Pre-Trial Crimes that would

More information

A Guide for Larimer County Parents

A Guide for Larimer County Parents Services Child Protection A Guide for Larimer County Parents This booklet was prepared by the Program Committee of the Larimer County Child Advocacy Center in consultation with the Larimer County Department

More information

A Victim s Guide to Understanding the Criminal Justice System

A Victim s Guide to Understanding the Criminal Justice System A Victim s Guide to Understanding the Criminal Justice System The Bartholomew County Prosecutor s Office Victim Assistance Program Prosecutor: William Nash 234 Washington Street Columbus, IN 47201 Telephone:

More information

Where can I get help after a sexual assault?

Where can I get help after a sexual assault? Sexual Assault What is assault? Assault is when someone uses force to hurt you. Slapping, kicking and pushing can be assault. Sometimes touching can be an assault. Threatening or trying to hurt someone

More information

RIGHTS OF DEAF AND HARD OF HEARING PEOPLE COURTS AND LAWYERS

RIGHTS OF DEAF AND HARD OF HEARING PEOPLE COURTS AND LAWYERS RIGHTS OF DEAF AND HARD OF HEARING PEOPLE COURTS AND LAWYERS PLEASE NOTE: For information in alternative formats or a language different than English, contact the Disability Rights Network at 800-692-

More information

Federal Criminal Court

Federal Criminal Court No person... shall be compelled in any criminal case to be a witness against himself nor be deprived of life, liberty or property without due process of law. Amendment V. Defendant may not be compelled

More information

The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School

The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School The National Criminal Justice Trial Competition Co-Sponsored By American Bar Association and The John Marshall Law School 2016 QUESTIONS SUBMITTED WITH ANSWERS A 2016 Casefile (revised), exhibit 3 (a-e)

More information

How to Use the California Identity Theft Registry

How to Use the California Identity Theft Registry How to Use the California Identity Theft Registry A Guide for Victims of Criminal Identity Theft Tips for Consumers Consumer Information Sheet 8 June 2014 What Is Criminal Identity Theft?...1 How You May

More information

A Ph.D. Curriculum for Digital Forensics

A Ph.D. Curriculum for Digital Forensics A Ph.D. Curriculum for Digital Forensics Dr. Frederick B. Cohen, Ph.D. California Sciences Institute dr.cohen at mac.com Dr. Thomas A. Johnson, Ph.D. California Sciences Institute tomjohnson at attglobal.net

More information

VI. Preparing for Successful Prosecution

VI. Preparing for Successful Prosecution VI. Preparing for Successful Prosecution Prosecutors at all levels share law enforcement s challenges in successfully bringing often complex identity crime cases to closure. Key challenges cited by members

More information

QUALITY STANDARDS FOR DIGITAL FORENSICS

QUALITY STANDARDS FOR DIGITAL FORENSICS QUALITY STANDARDS FOR DIGITAL FORENSICS November 20, 2012 TABLE OF CONTENTS PREFACE... ii MANAGEMENT STANDARDS... 1 A. DIGITAL FORENSIC CAPABILITY... 1 B. QUALITY MANAGEMENT... 2 PERSONNEL STANDARDS...

More information

*Reference Material For information only* The following was put together by one of our classmates! Good job! Well Done!

*Reference Material For information only* The following was put together by one of our classmates! Good job! Well Done! From: "We The People for Independent Texas" Subject: No contract - No case. *Reference Material For information only* The following was put together by one of our classmates! Good job! Well Done! Courts

More information

Prosecutors in State Courts, 2007 - Statistical Tables

Prosecutors in State Courts, 2007 - Statistical Tables U.S. Department of Justice Office of Justice Programs Bureau of Justice Statistics 2007 National Census of State Court Prosecutors December 2011, NCJ 234211 Prosecutors in State Courts, 2007 - Statistical

More information

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET

PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Graduate Council Document 08-41a Approved by the Graduate Council on May 6, 2010 PROPOSAL GRADUATE CERTIFICATE IN FORENSIC ACCOUNTING & FRAUD INVESTIGATION TO BE OFFERED AT PURDUE UNIVERSITY CALUMET Proposal

More information

Criminal Justice System Commonly Used Terms & Definitions

Criminal Justice System Commonly Used Terms & Definitions Criminal Justice System Commonly Used Terms & Definitions A B C D E F G H I J K L M N O P Q R S T U V W X Y Z Accused: Acquittal: Adjudication: Admissible Evidence: Affidavit: Alford Doctrine: Appeal:

More information

Course Forensic Science. Unit II History

Course Forensic Science. Unit II History Course Forensic Science Unit II History Essential Question What is legally and ethically expected of forensic scientists and Crime Scene Investigators? TEKS 130.295(c) (4)(C) Prior Student Learning History

More information

Purpose of the Victim/Witness Unit

Purpose of the Victim/Witness Unit Purpose of the Victim/Witness Unit The Victim/Witness Assistance Division of the Lake County State s Attorney s Office was formed to serve the needs of people like you. The division is meant to ensure

More information

STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE

STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE STATEMENT OF RONALD A. CIMINO DEPUTY ASSISTANT ATTORNEY GENERAL FOR CRIMINAL MATTERS, TAX DIVISION, U.S. DEPARTMENT OF JUSTICE BEFORE THE SENATE FINANCE COMMITTEE SUBCOMMITTEE ON FISCAL RESPONSIBILITY

More information

Peace Bond Process. What is a Peace Bond? Contents

Peace Bond Process. What is a Peace Bond? Contents Peace Bond Process October 2010 Contents Peace Bond Basics 2 The Process 3 Protecting Privacy 5 Joint Peace Bonds 9 The purpose of this brochure is to help guide you through the process of acquiring a

More information

HOUSE BILL 1067. By Jernigan BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE:

HOUSE BILL 1067. By Jernigan BE IT ENACTED BY THE GENERAL ASSEMBLY OF THE STATE OF TENNESSEE: HOUSE BILL 1067 By Jernigan AN ACT to amend Tennessee Code Annotated, Title 40, Chapter 17, relative to requiring reciprocal disclosure of witnesses prior to trial. BE IT ENACTED BY THE GENERAL ASSEMBLY

More information

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry

FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry FLORIDA STATE UNIVERSITY POLICE DEPARTMENT Chief David L. Perry 830 West Jefferson Street 850-644-1234 VICTIMS' RIGHTS BROCHURE YOUR RIGHTS AS A VICTIM OR WITNESS: ------- We realize that for many persons,

More information

COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT STANDING ORDER NO. 2-86 (AMENDED)

COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT STANDING ORDER NO. 2-86 (AMENDED) COMMONWEALTH OF MASSACHUSETTS THE TRIAL COURT SUFFOLK, ss. SUPERIOR COURT DEPARTMENT STANDING ORDER NO. 2-86 (AMENDED) Applicable to All Counties to cases initiated by indictment on or after September

More information

AFFIDAVIT OF JOHN P. KELLEHER. John P. Kelleher, being duly sworn upon oath, deposes and says:

AFFIDAVIT OF JOHN P. KELLEHER. John P. Kelleher, being duly sworn upon oath, deposes and says: STATE OF NEVADA ) ) ss: COUNTY OF CLARK ) AFFIDAVIT OF JOHN P. KELLEHER John P. Kelleher, being duly sworn upon oath, deposes and says: 1. I am an attorney licensed to practice law in the State of Nevada;

More information

How To Decide A Case In The Uk

How To Decide A Case In The Uk 1 THE COURT: You have been selected and sworn to determine the facts and render a verdict in the case of the Commonwealth / 1 of Pennsylvania versus Robert Greene, who is charged with one count of robbery,

More information

PARENT GUIDE TO THE JUVENILE COURT CHIPS PROCESS

PARENT GUIDE TO THE JUVENILE COURT CHIPS PROCESS PARENT GUIDE TO THE JUVENILE COURT CHIPS PROCESS INTRODUCTION This booklet has been prepared to help parents gain a better understanding of what to expect in Juvenile Court CHIPS proceedings (Chapter 48

More information

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak

CSN08101 Digital Forensics. Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak CSN08101 Digital Forensics Lecture 4A: Forensic Processes Module Leader: Dr Gordon Russell Lecturers: Robert Ludwiniak Forensics Processes - objectives Investigation Process Forensic Ethics Issues Forensic

More information

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed

BILL ANALYSIS. Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed BILL ANALYSIS Senate Research Center H.B. 2268 By: Frullo et al. (Carona) Criminal Justice 5/12/2013 Engrossed AUTHOR'S / SPONSOR'S STATEMENT OF INTENT Internet communications companies often hold information

More information

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives

FRD506. Financial investigation and Forensic Accounting - 30 hours. Objectives FRD506 Financial investigation and Forensic Accounting - 30 hours Objectives This course Financial Investigation and Forensic Accounting, Third Edition examines different types of offenses with a financial

More information

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection

INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT. IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection As amended by P.L.79-2007. INDIANA FALSE CLAIMS AND WHISTLEBLOWER PROTECTION ACT IC 5-11-5.5 Chapter 5.5. False Claims and Whistleblower Protection IC 5-11-5.5-1 Definitions Sec. 1. The following definitions

More information

CHEVRON CORP AND TEXACO PETROLEUM COMPANY V. THE REPUBLIC OF ECUADOR EXPERT REBUTTAL REPORT OF J. CHRISTOPHER RACICH DECEMBER 16, 2013

CHEVRON CORP AND TEXACO PETROLEUM COMPANY V. THE REPUBLIC OF ECUADOR EXPERT REBUTTAL REPORT OF J. CHRISTOPHER RACICH DECEMBER 16, 2013 CHEVRON CORP AND TEXACO PETROLEUM COMPANY V. THE REPUBLIC OF ECUADOR EXPERT REBUTTAL REPORT OF J. CHRISTOPHER RACICH DECEMBER 16, 2013 1 I. BACKGROUND AND QUALIFICATIONS 1. Vestigant, LLC ( Vestigant )

More information

Admissibility of Digital Photographs in Criminal Trials

Admissibility of Digital Photographs in Criminal Trials Admissibility of Digital Photographs in Criminal Trials Keith Hodges, Senior Instructor, Keith.Hodges@dhs.gov Federal Law Enforcement Training Center Glynco, GA 1 What we will discuss Digital photos captured

More information

THE SUPREME COURT OF THE REPUBLIC OF PALAU HANDBOOK FOR TRIAL JURORS

THE SUPREME COURT OF THE REPUBLIC OF PALAU HANDBOOK FOR TRIAL JURORS THE SUPREME COURT OF THE REPUBLIC OF PALAU HANDBOOK FOR TRIAL JURORS I. Purpose of This Handbook The purpose of this handbook is to acquaint trial jurors with the general nature and importance of their

More information

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014

Introduction to Data Forensics. Jeff Flaig, Security Consultant January 15, 2014 Introduction to Data Forensics Jeff Flaig, Security Consultant January 15, 2014 WHAT IS COMPUTER FORENSICS Computer forensics is the process of methodically examining computer media (hard disks, diskettes,

More information

When you need someone to scrutinize your financial situation, call Kessler International we'll turn your questions into answers.

When you need someone to scrutinize your financial situation, call Kessler International we'll turn your questions into answers. It's no secret that today's highly-volatile business environment demands a high level of financial scrutiny multinational corporations have been brought down by instances of financial fraud, often perpetrated

More information

Franklin County State's Attorney Victim Services

Franklin County State's Attorney Victim Services Franklin County State's Attorney Victim Services FREQUENTLY ASKED QUESTIONS What type of services and information can I get through Victim Services Program? A Victim Advocate will be assigned to assist

More information

Results. Contact sexual crimes based on PSI and self-report after SOTP participation

Results. Contact sexual crimes based on PSI and self-report after SOTP participation Self-Reported Contact Sexual Offenses by Participants in the Federal Bureau of Prisons Sex Offender Treatment Program: Implications for Internet Sex Offenders Andres E. Hernandez, Psy.D. Director, Sex

More information

OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT

OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT OFFICE OF THE DISTRICT ATTORNEY GEORGE H. BRAUCHLER, DISTRICT ATTORNEY 18TH JUDICIAL DISTRICT SERVING ARAPAHOE, DOUGLAS, ELBERT AND LINCOLN COUNTIES 6450 S. REVERE PARKWAY CENTENNIAL, CO 80111 (720) 874-8500

More information

Motion Practice: Pitching your case from start to finish

Motion Practice: Pitching your case from start to finish Motion Practice: Pitching your case from start to finish 2013 State Public Defender Conference Milwaukee, WI Craig Mastantuono & Rebecca Coffee Mastantuono & Coffee SC Integrated Motion Practice Motions

More information

Services. Computer Forensic Investigations

Services. Computer Forensic Investigations DataTriangle, Inc. is uniquely structured to provide you with a high quality expert as expeditiously as possible. Charles Snipes has nearly 15 years of experience with criminal investigations in the areas

More information

Computer Forensics US-CERT

Computer Forensics US-CERT Computer Forensics US-CERT Overview This paper will discuss the need for computer forensics to be practiced in an effective and legal way, outline basic technical issues, and point to references for further

More information

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench

Glossary of Terms Acquittal Affidavit Allegation Appeal Arraignment Arrest Warrant Assistant District Attorney General Attachment Bail Bailiff Bench Glossary of Terms The Glossary of Terms defines some of the most common legal terms in easy-tounderstand language. Terms are listed in alphabetical order. A B C D E F G H I J K L M N O P Q R S T U V W

More information

CRIME SCENE INVESTIGATION

CRIME SCENE INVESTIGATION CRIME SCENE INVESTIGATION CHAPTER 2 Mr. Moss 1 CRIME SCENE INVESTIGATION Crime scenes tell a story Crime scene investigators must be careful and systematic Crime scene investigators must follow protocol

More information

The criminal and civil justice systems in England and Wales

The criminal and civil justice systems in England and Wales The criminal and civil justice systems in England and Wales Introduction Important differences exist between UK civil and criminal proceedings that have implications for fraud investigations, including

More information

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.

Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model. Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail. Legal Framework to Combat Cyber Crimes in the Region: Qatar as a Model Judge Dr. Ehab Elsonbaty Cyber Crime expert ehabelsonbaty@hotmail.com Why should we care about CYBER CRIME & CYBER SECURITY? Clarification

More information

LAW OFFICE OF JILLIAN T. WEISS, P.C. P.O. BOX 642 TUXEDO PARK, NEW YORK 10987 (845) 709-3237 Fax: (845) 915-3283

LAW OFFICE OF JILLIAN T. WEISS, P.C. P.O. BOX 642 TUXEDO PARK, NEW YORK 10987 (845) 709-3237 Fax: (845) 915-3283 LAW OFFICE OF JILLIAN T. WEISS, P.C. P.O. BOX 642 TUXEDO PARK, NEW YORK 10987 (845) 709-3237 Fax: (845) 915-3283 INFORMATION ABOUT CLIENT REPRESENTATION Thank you for considering retaining the Law Office

More information

C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru

C R I M E S C E N E. Forensic Science CC 30.07 Spring 2007 Prof. Nehru C R I M E S C E N E Physical Evidence Crime laboratories run on physical evidence Physical evidence encompasses any and all objects that can establish that a crime has been committed or can provide a link

More information

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements

Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements Breakfast Meeting: Securing your Secured Data Digital Forensics, Fraud and Forensic Advancements 9 April 2013 Facilitator: Dr. Sheau-Dong Lang, Coordinator Master of Science in Digital Forensics University

More information

Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations

Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations Chapter 13 Procedure (Last Updated: May 13, 2013) Chapter 13.A Speedy Trial Chapter 13.B Recorded Interrogations Chapter 13.A Procedure Speedy Trial (Last Updated: May 13, 2013) 29-1207. Trial within six

More information

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME

STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME STATE OF NEW HAMPSHIRE STRATEGIC PLAN TO ADDRESS CYBER CRIME MAY 2004 Page 1 of 7 State of New Hampshire Strategic Plan to Address Cyber Crime May 2004 Introduction Cyber crime, or more broadly, electronic

More information

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27

GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 GENERAL ASSEMBLY OF NORTH CAROLINA SESSION 2011 SESSION LAW 2011-19 HOUSE BILL 27 AN ACT TO (1) CREATE THE NORTH CAROLINA FORENSIC SCIENCE ADVISORY BOARD, (2) ENCOURAGE EFFORTS TO ELIMINATE SOURCES OF

More information

CLAIMS AGAINST TELEPHONE ANSWERING SERVICES: THE TRILOGY OF PREVENTION, HANDLING AND RESOLUTION PART TWO: WHAT TO DO WHEN A CLAIM HAPPENS

CLAIMS AGAINST TELEPHONE ANSWERING SERVICES: THE TRILOGY OF PREVENTION, HANDLING AND RESOLUTION PART TWO: WHAT TO DO WHEN A CLAIM HAPPENS CLAIMS AGAINST TELEPHONE ANSWERING SERVICES: THE TRILOGY OF PREVENTION, HANDLING AND RESOLUTION PART TWO: WHAT TO DO WHEN A CLAIM HAPPENS Martin M. Ween, Esq. Partner Wilson, Elser, Moskowitz, Edelman

More information

JUROR S MANUAL (Prepared by the State Bar of Michigan)

JUROR S MANUAL (Prepared by the State Bar of Michigan) JUROR S MANUAL (Prepared by the State Bar of Michigan) Your Role as a Juror You ve heard the term jury of one s peers. In our country the job of determining the facts and reaching a just decision rests,

More information

Sufficiency of Windows Event log as Evidence in Digital Forensics

Sufficiency of Windows Event log as Evidence in Digital Forensics Sufficiency of Windows Event log as Evidence in Digital Forensics Nurdeen M. Ibrahim & A. Al-Nemrat, Hamid Jahankhani, R. Bashroush University of East London School of Computing, IT and Engineering, UK

More information

Maricopa County Attorney s Office Adult Criminal Case Process

Maricopa County Attorney s Office Adult Criminal Case Process The following is a brief description of the process to prosecute an adult accused of committing a felony offense. Most misdemeanor offenses are handled by municipal prosecutors; cases involving minors

More information

Glossary. To seize a person under authority of the law. Police officers can make arrests

Glossary. To seize a person under authority of the law. Police officers can make arrests Criminal Law Glossary Arrest Charge Convicted Court Crime/Offence Crown Attorney or Prosecutor Criminal Custody Guilty Illegal Innocent Lawyer To seize a person under authority of the law. Police officers

More information

CONSTITUTIONAL RIGHTS

CONSTITUTIONAL RIGHTS RIGHTS OF THE CRIMINALLY ACCUSED GENERAL LEGAL RIGHTS CHAPTER 10 INTRODUCTION Constitutional rights relating to American criminal law are the same for all adult persons, whether they have a disability

More information

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional

Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional THE FAMILY LAW PROCESS AND ITS REQUIREMENTS Connecting with clients through authentic interactions that not only satisfy their practical needs, but also their emotional wants.! 1. ARRAIGNMENT: Arraignment

More information

CCE Certification Competencies

CCE Certification Competencies CCE Certification Competencies May 10, 2012 Page 1 The Certified Computer Examiner (CCE) has evolved into one of the most desired certifications in the computer forensics industry. The certification is

More information

In recent years, energy industry users have increasingly voiced the complaint

In recent years, energy industry users have increasingly voiced the complaint Controlling Costs in Domestic Energy Arbitrations by The Hon. Mark Whittington 1, JAMS In recent years, energy industry users have increasingly voiced the complaint that arbitration has become much like

More information

In an age where so many businesses and systems are reliant on computer systems,

In an age where so many businesses and systems are reliant on computer systems, Cyber Security Laws and Policy Implications of these Laws In an age where so many businesses and systems are reliant on computer systems, there is a large incentive for maintaining the security of their

More information

U.S. Citizenship and Inurtigratioil,services

U.S. Citizenship and Inurtigratioil,services U $. Depal'tJDent of IIcnnelami.Sec.urity U.S. Citizenship and Immigration. Services Administrative Appeals Office (AAO) 20 Massachusetts Ave., N.W., MS 2090 Washington, DC 20529-2090 U.S. Citizenship

More information

A Guide for Witnesses

A Guide for Witnesses Community Legal Information Association of Prince Edward Island, Inc. A Guide for Witnesses Introduction You may be called as a witness for either a criminal or civil trial. This pamphlet explains your

More information

Kittitas County Prosecuting Attorney GREGORY L. ZEMPEL

Kittitas County Prosecuting Attorney GREGORY L. ZEMPEL Kittitas County Prosecuting Attorney GREGORY L. ZEMPEL KITTITAS COUNTY COURTHOUSE 205 WEST FIFTH, ROOM 213 ELLENSBURG, WA 98926-3129 Deputies: TELEPHONE (509) 962-7520 L. Candace Hooper FAX (509) 962-7022

More information

THE MINNESOTA LAWYER

THE MINNESOTA LAWYER THE MINNESOTA LAWYER September 6, 2004 MN Court of Appeals Allows Testimony on Battered-Woman Syndrome By Michelle Lore A District Court judge properly allowed an expert on battered-woman syndrome to testify

More information

Questions you should ask before hiring a criminal defense lawyer

Questions you should ask before hiring a criminal defense lawyer Questions you should ask before hiring a criminal defense lawyer Here are some questions you should Ask Before Hiring Any Attorney to represent your San Diego Criminal or San Diego DUI case. NOTE: We urge

More information

Crimes (Computer Hacking)

Crimes (Computer Hacking) 2009-44 CRIMES (COMPUTER HACKING) ACT 2009 by Act 2011-23 as from 23.11.2012 Principal Act Act. No. 2009-44 Commencement except ss. 15-24 14.1.2010 (LN. 2010/003) Assent 3.12.2009 Amending enactments Relevant

More information

7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ

7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ 7. MY RIGHTS IN DEALING WITH CRIMINAL LAW AND THE GARDAÍ 7.1 Victim of a crime What are my rights if I have been the victim of a crime? As a victim of crime, you have the right to report that crime to

More information

Public Hearing Before the. United States Sentencing Commission. Panel Two

Public Hearing Before the. United States Sentencing Commission. Panel Two Public Hearing Before the United States Sentencing Commission Panel Two William Wilberforce Trafficking Victims Protection Reauthorization Act of 2008 Tuesday, March 17, 2009 3:45 p.m. 4:45 p.m. Federal

More information

How To Develop A Financial Crimes Unit In Utah

How To Develop A Financial Crimes Unit In Utah UTAH ATTORNEY GENERAL S OFFICE FINANCIAL CRIMES PROSECUTION UNIT Prepared for the Utah Commission on Criminal and Juvenile Justice Russell K. Van Vleet July 1996 UTAH ATTORNEY GENERAL S OFFICE FINANCIAL

More information

When E-Discovery Becomes Evidence

When E-Discovery Becomes Evidence Monday, June 11, 2007 When E-Discovery Becomes Evidence Make sure that you can easily authenticate the information that was so costly to produce By Leonard Deutchman Special to the Law Weekly A federal

More information

Privacy Impact Assessment of the Supervisory Enforcement Actions and Special Examinations Tracking System

Privacy Impact Assessment of the Supervisory Enforcement Actions and Special Examinations Tracking System Privacy Impact Assessment of the Supervisory Enforcement Actions and Special Examinations Tracking System Program or application name. Supervisory Enforcement Actions and Special Examinations Tracking

More information

Morgan County Prosecuting Attorney Debra MH McLaughlin

Morgan County Prosecuting Attorney Debra MH McLaughlin Morgan County Prosecuting Attorney Debra MH McLaughlin Directions: From Fairfax Street Entrance, Enter Main Door, turn Right through door, up the narrow staircase. Office is at top of steps. (Old Circuit

More information

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION

TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION TOP TEN TIPS FOR WINNING YOUR CASE IN JURY SELECTION PRESENTED BY JEFF KEARNEY KEARNEY & WESTFALL 2501 PARKVIEW STREET, SUITE 300 FORT WORTH, TEXAS 76102 (817) 336-5600 LUBBOCK CRIMINAL DEFENSE LAWYERS

More information

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor

Secretary of the Senate. Chief Clerk of the Assembly. Private Secretary of the Governor Senate Bill No. 467 Passed the Senate September 10, 2013 Secretary of the Senate Passed the Assembly September 9, 2013 Chief Clerk of the Assembly This bill was received by the Governor this day of, 2013,

More information

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act

Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act Bill C-20 An act to amend the Criminal Code (Protection of children and other vulnerable persons) and the Canada Evidence Act The Canadian Resource Centre for Victims of Crime is a national, non-profit

More information

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION

CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION VCU 1 CRIMINAL JUSTICE, BACHELOR OF SCIENCE (B.S.) WITH A CONCENTRATION IN FORENSIC CRIME SCENE INVESTIGATION The major objective of this degree program is to prepare students for effective professional

More information

HANDBOOK FOR JURORS IN CRIMINAL AND CIVIL CASES IN THE. For the. Parish of St. Charles. Courthouse. Hahnville, Louisiana JUDGES

HANDBOOK FOR JURORS IN CRIMINAL AND CIVIL CASES IN THE. For the. Parish of St. Charles. Courthouse. Hahnville, Louisiana JUDGES Jury Duty Information HANDBOOK FOR JURORS IN CRIMINAL AND CIVIL CASES IN THE 29 th Judicial Court For the Parish of St. Charles Courthouse Hahnville, Louisiana JUDGES EMILE R. ST.PIERRE Division C M. LAUREN

More information

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION

IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION IN THE UNITED STATES DISTRICT COURT FOR THE WESTERN DISTRICT OF MISSOURI WESTERN DIVISION UNITED STATES OF AMERICA, ) ) Plaintiff, ) ) vs. ) Case No. 09-00296-03-CR-W-FJG ) ROBERT E. STEWART, ) ) Defendant.

More information

Domestic Violence: Can the Legal System Help Protect Me?

Domestic Violence: Can the Legal System Help Protect Me? Domestic Violence: Can the Legal System Help Protect Me? What is domestic violence? Domestic violence is a pattern of physically and/or emotionally abusive behavior used to control another person with

More information

BBB Rules of Non-Binding Arbitration for Extended Service Plans/Extended Service Coverage Naming BBB as Administrator

BBB Rules of Non-Binding Arbitration for Extended Service Plans/Extended Service Coverage Naming BBB as Administrator BBB Rules of Non-Binding Arbitration for Extended Service Plans/Extended Service Coverage Naming BBB as Administrator BBB ARBITRATION Your Better Business Bureau (BBB) is a nonprofit organization supported

More information

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631)

TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) TASK LIST UTILITIES SERVICE INVESTIGATOR (CLASS CODE 1631) 1. Initiates investigations of alleged loss or theft of department property such as inventory, assets, and/or cash after notification of such

More information

Domestic Violence Case Management Plan

Domestic Violence Case Management Plan Domestic Violence Case Management Plan From the commencement of litigation to its resolution, whether by trial or settlement, it is the goal of this Court to reduce delay and enable just and efficient

More information

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN

TAIWAN. Edgar Y. CHEN. Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN TAIWAN Edgar Y. CHEN Tsar & Tsai Law Firm G 8 th Fl., 245 DunHua S. Rd., Sec. 1. Taipei 106 TAIWAN Phone: G 88-2-27814111 or 66386999 Fax : G 886-2-27213834 or 27315581 Email: G law@tsartsai.com.tw 1 1

More information

Purely applied tools. Thinking is difficult and sometimes unpleasant.

Purely applied tools. Thinking is difficult and sometimes unpleasant. Purely applied tools Bell Labs success factors Freund, Hentoff, the Curmudgeon Munger s 24 Standard Causes of Human Misjudgment Valuable Intellectual Traits Thinking is difficult and sometimes unpleasant.

More information

02 DEPARTMENT OF PROFESSIONAL AND FINANCIAL REGULATION 94-649 MAINE COMMISSION ON INDIGENT LEGAL SERVICES

02 DEPARTMENT OF PROFESSIONAL AND FINANCIAL REGULATION 94-649 MAINE COMMISSION ON INDIGENT LEGAL SERVICES 02 DEPARTMENT OF PROFESSIONAL AND FINANCIAL REGULATION 94-649 MAINE COMMISSION ON INDIGENT LEGAL SERVICES Chapter 3: ELIGIBILITY REQUIREMENTS FOR SPECIALIZED CASE TYPES Summary: Chapter 2 of the Commission

More information

AN OVERVIEW OF THE JUVENILE JUSTICE SYSTEM

AN OVERVIEW OF THE JUVENILE JUSTICE SYSTEM 2006 AN OVERVIEW OF THE JUVENILE JUSTICE SYSTEM OUTCOMES As a result of this lesson, students will be able to: Summarize juvenile court process and procedures Define legal terms used in the juvenile justice

More information

WHITE PAPER ON THE JUDICIAL SYSTEM FOR THE ELDER JUSTICE COORDINATING COUNCIL

WHITE PAPER ON THE JUDICIAL SYSTEM FOR THE ELDER JUSTICE COORDINATING COUNCIL WHITE PAPER ON THE JUDICIAL SYSTEM FOR THE ELDER JUSTICE COORDINATING COUNCIL Written by Lori A. Stiegel, Senior Attorney 1 American Bar Association Commission on Law and Aging OVERVIEW Growth of the older

More information